Computer Misuse Act Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Collegeprof101
C
Collegeprof101
Community Contributor
Quizzes Created: 1 | Total Attempts: 687
| Attempts: 687 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. A friend often comes to your house and will use your tablet computer when you are out of the room. You tell her that she is not allowed to do that even though the tablet is not password protected. The next time she comes over she again uses your tablet when you are out of the room. Has she committed an offence under the CMA?

Explanation

This is essentially Ellis v DPP. As soon as you told your friend she was not entitled to do this whe was put on notice that her access was unauthorised.

Submit
Please wait...
About This Quiz
Computer Misuse Act Quiz - Quiz

This quiz assesses knowledge of the UK's Computer Misuse Act, focusing on legal implications of actions like virus creation, unauthorized data access, and misuse of computer systems. It's... see moreideal for learners interested in cybersecurity and legal compliance. see less

2. Using a Computer to access data without authorisation is covered by which section of the Computer Misuse Act?

Explanation

Section 1 is all about accessing data without authorisation

Submit
3. Where does the Computer Misuse Act 1990 apply?

Explanation

Although the Act can regulate actions which have effects overseas the territorial scope of the UK is to the UK only.

Submit
4. To be guilty of the offence in section 1 of the Computer Misuse Act 1990 what must a defendant cause a computer to do?

Explanation

The s.1 offence (hacking) is accessing data without authorisation on a computer

Submit
5. A security tester, based in the UK, who tests computer security by attempting to hack into them is committing an offence under the Computer Misuse Act if...

Explanation

Section 2 of the Act states that any access to computer programs or data which is done with the intent to commit further crimes is illegal.

Submit
6. A friend accesses the LSE's servers to find the home address of another student as they are obsessed with them and want to get their address to "stalk" them. They then find the LSE servers do not have the home address of students so this was a waste of time. What offence if any have they committed?

Explanation

This is a s.2 offence, even though the further offence could not actually be committed in this fashion - see s.2(3). Also stalking is covered as it has a potential 5 year prison sentence.

Submit
7. A person installs a new piece of software on their own computer which subsequently slows it down impairing their use of it. Could the software manufacturer be prosecuted under the Computer Misuse Act?

Explanation

This law deals with unauthorised access, modification and impairment only. Not authorised actions.

Submit
8. You work as a journalist for a local newspaper. One day someone files a story saying Andy Murray (the great tennis player, not law professor) is in town. You really want to meet him and get his autograph so you look at the story details filed on your employer's database to see where he is staying. Have you committed an offence?

Explanation

This is based upon Bignall and Allison. Allison overruled the Bignall authorised access for an unauthorised purpose defence. It is not s.2 as an autograph is not a further offence.

Submit
9. Someone uses a laptop as a hammer to destroy a Hard Drive containing sensitive data, could they be convicted under the Computer Misuse Act?

Explanation

The physical damage is still covered by the Criminal Damage Act. The CMA only deals with alteration, impairment or deletion of data.

Submit
10. Is the creation of viruses specifically prohibited under the Computer Misuse Act?

Explanation

The Act doesn't prohibit the creation of viruses, or indeed using them on equipment/data with the owners permission. However if the virus does access or modify data or impair a computer without authorisation it becomes illegal

Submit
11. Is there following statement correct and why?"System administrators have a legal obligation (as part of this act) to protect their systems from hackers"

Explanation

This is beyond the scope of the Act but may be covered under some contract law

Submit
12. Where could Gary MacKinnon have been tried?

Explanation

He could be tried under s4(1)(b) in England & Wales (the UK is of course not a single jurisdiction) and he could have been tried under Federal Laws in the US.

Submit
13. A person is convicted of accessing the LSE network and modifying their grades in the student records, what is the maximum penalty they face?

Explanation

This is an offence under s.3(2)(c) of the Act "to impair the operation of any such program or the reliability of any such data" This carries an up to 10 year sentence.

Submit
14. A hacker group attacks the webpage of 10 Downing Street and occupies it using a DDoS attack. They issue a statement that this was done to protest the UK's climate change policy. Have they a defence against any charges under s.3 of the CMA?

Explanation

Firstly, there is no s.3(5)(d). Secondly there are no defences for hacktivists.

Submit
15. A poorly constructed mailserver goes a little crazy and sends 100,000 messages to [email protected]. This causes the LSE mailserver to fail. Is there a possible CMA offence?

Explanation

Even though there was no intent this could be seen to be reckless under s.3(3)

Submit
View My Results

Quiz Review Timeline (Updated): Mar 15, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 27, 2017
    Quiz Created by
    Collegeprof101
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A friend often comes to your house and will use your tablet computer...
Using a Computer to access data without authorisation is covered by...
Where does the Computer Misuse Act 1990 apply?
To be guilty of the offence in section 1 of the Computer Misuse Act...
A security tester, based in the UK, who tests computer security by...
A friend accesses the LSE's servers to find the home address of...
A person installs a new piece of software on their own computer which...
You work as a journalist for a local newspaper. One day someone files...
Someone uses a laptop as a hammer to destroy a Hard Drive containing...
Is the creation of viruses specifically prohibited under the Computer...
Is there following statement correct and why?"System...
Where could Gary MacKinnon have been tried?
A person is convicted of accessing the LSE network and modifying their...
A hacker group attacks the webpage of 10 Downing Street and occupies...
A poorly constructed mailserver goes a little crazy and sends 100,000...
Alert!

Advertisement